Описание
Security update for nodejs22
This update for nodejs22 fixes the following issues:
Update to 22.13.1:
- CVE-2025-23083: Fixed worker permission bypass via InternalWorker leak in diagnostics (bsc#1236251)
- CVE-2025-23085: Fixed HTTP2 memory leak on premature close and ERR_PROTO (bsc#1236250)
- CVE-2025-22150: Fixed insufficiently random values used when defining the boundary for a multipart/form-data request in undici (bsc#1236258)
Список пакетов
Container bci/node:22
SUSE Linux Enterprise Module for Web and Scripting 15 SP6
openSUSE Leap 15.6
Ссылки
- Link for SUSE-SU-2025:0284-1
- E-Mail link for SUSE-SU-2025:0284-1
- SUSE Security Ratings
- SUSE Bug 1236250
- SUSE Bug 1236251
- SUSE Bug 1236258
- SUSE CVE CVE-2025-22150 page
- SUSE CVE CVE-2025-23083 page
- SUSE CVE CVE-2025-23085 page
Описание
Undici is an HTTP/1.1 client. Starting in version 4.5.0 and prior to versions 5.28.5, 6.21.1, and 7.2.3, undici uses `Math.random()` to choose the boundary for a multipart/form-data request. It is known that the output of `Math.random()` can be predicted if several of its generated values are known. If there is a mechanism in an app that sends multipart requests to an attacker-controlled website, they can use this to leak the necessary values. Therefore, an attacker can tamper with the requests going to the backend APIs if certain conditions are met. This is fixed in versions 5.28.5, 6.21.1, and 7.2.3. As a workaround, do not issue multipart requests to attacker controlled servers.
Затронутые продукты
Ссылки
- CVE-2025-22150
- SUSE Bug 1236257
Описание
With the aid of the diagnostics_channel utility, an event can be hooked into whenever a worker thread is created. This is not limited only to workers but also exposes internal workers, where an instance of them can be fetched, and its constructor can be grabbed and reinstated for malicious usage. This vulnerability affects Permission Model users (--permission) on Node.js v20, v22, and v23.
Затронутые продукты
Ссылки
- CVE-2025-23083
- SUSE Bug 1236251
Описание
A memory leak could occur when a remote peer abruptly closes the socket without sending a GOAWAY notification. Additionally, if an invalid header was detected by nghttp2, causing the connection to be terminated by the peer, the same leak was triggered. This flaw could lead to increased memory consumption and potential denial of service under certain conditions. This vulnerability affects HTTP/2 Server users on Node.js v18.x, v20.x, v22.x and v23.x.
Затронутые продукты
Ссылки
- CVE-2025-23085
- SUSE Bug 1236250